Sciweavers

164 search results - page 15 / 33
» A History of C : 1979-1991
Sort
View
ICIP
2010
IEEE
13 years 5 months ago
Wavelet-based image compression anti-forensics
Because digital images can be modified with relative ease, considerable effort has been spent developing image forensic algorithms capable of tracing an image's processing hi...
Matthew C. Stamm, K. J. Ray Liu
SCP
2011
197views Communications» more  SCP 2011»
13 years 2 months ago
A state/event-based model-checking approach for the analysis of abstract system properties
system properties Maurice H. ter Beeka,∗ , Alessandro Fantechia,b , Stefania Gnesia , Franco Mazzantia a Istituto di Scienza e Tecnologie dell’Informazione ‘‘A. Faedo’’...
Maurice H. ter Beek, Alessandro Fantechi, Stefania...
ALGORITHMICA
1999
99views more  ALGORITHMICA 1999»
13 years 7 months ago
Evolutionary Trees and Ordinal Assertions
Sequence data for a group of species is often summarized by a distance matrix M where M[s, t] is the dissimilarity between the sequences of species s and t. An ordinal assertion is...
Paul E. Kearney, Ryan Hayward, Henk Meijer
ASPLOS
2004
ACM
14 years 23 days ago
Fingerprinting: bounding soft-error detection latency and bandwidth
Recent studies have suggested that the soft-error rate in microprocessor logic will become a reliability concern by 2010. This paper proposes an efficient error detection techniqu...
Jared C. Smolens, Brian T. Gold, Jangwoo Kim, Baba...
INFSOF
2006
102views more  INFSOF 2006»
13 years 7 months ago
Comparison of software architecture reverse engineering methods
Problems related to interactions between components is a sign of problems with the software architecture of the system and are often costly to fix. Thus it is very desirable to id...
Catherine Stringfellow, C. D. Amory, Dileep Potnur...